ExamGecko
Question list
Search
Search

Question 319 - CISM discussion

Report
Export

Which is following should be an information security manager's PRIMARY focus during the development of a critical system storing highly confidential data?

A.
Reducing the number of vulnerabilities detected
Answers
A.
Reducing the number of vulnerabilities detected
B.
Ensuring the amount of residual risk is acceptable
Answers
B.
Ensuring the amount of residual risk is acceptable
C.
Avoiding identified system threats
Answers
C.
Avoiding identified system threats
D.
Complying with regulatory requirements
Answers
D.
Complying with regulatory requirements
Suggested answer: B

Explanation:

The information security manager's primary focus during the development of a critical system storing highly confidential data should be ensuring the amount of residual risk is acceptable. Residual risk is the level of cyber risk remaining after all the security controls are accounted for, any threats have been addressed and the organization is meeting security standards. It's the risk that slips through the cracks of the system. For a critical system storing highly confidential data, the residual risk should be as low as possible, and within the organization's risk appetite and tolerance. The information security manager should monitor and review the residual risk throughout the system development life cycle, and ensure that it is communicated and approved by the appropriate stakeholders. The other options are not the primary focus, although they may be part of the security objectives and activities. Reducing the number of vulnerabilities detected is a desirable outcome, but it does not necessarily mean that the residual risk is acceptable, as some vulnerabilities may have a higher impact or likelihood than others. Avoiding identified system threats is a preventive measure, but it does not account for unknown or emerging threats that may pose a residual risk to the system. Complying with regulatory requirements is a mandatory obligation, but it does not guarantee that the residual risk is acceptable, as regulations may not cover all aspects of security or reflect the specific context and needs of the organization.

asked 01/10/2024
Malik Rubio
40 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first